Teaching Strategies and Distributed Guided Practice/Summarizing Prompts: Phishing, Tricking someone into giving up private data by masquerading as an authority. Usually involves a spoof website that tricks you into believing you are on a real web site for the business you think you are dealing with. Vishing, Using VOIP (robocalls) to phish over the phone system. SMishing, using test messaging to phish. Hoax,is a deliberate attempt to dupe, deceive or trick an audience into believing, or accepting, that something is real Scam, A fraudulent business scheme; a swindle. Often involves false business claims or advertising Virus, computer program that can copy itself and infect a computer without the permission or knowledge of the owner Identity theft fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Malware software such as a virus, worm, trojan horse, or spyware that is installed on a system with harmful or malicious intent. Pharming, is a hacker's attack aiming to redirect a website's traffic to another, bogus website. Trojan Horse, Trojan horse is a program that appears harmless but has a hidden agenda. Spyware, is computer software that is installed surreptitiously on a personal computer to collect information about a user, Puddle Attack A phishing attack targeting the clients of a small financial institution, typically with very limited geographical coverage Spear Phishing, the attacker infers or manipulates the context of his intended victim, and then "personalizes" his attack.
Digital Literacy Day#
Phishing, Vishing, SMS, Hoax, Scam, virus, identity theft, malware, pharming, Trojan Horse, Spyware, Puddle Attack
Spear Phishing,
Phishing, Tricking someone into giving up private data by masquerading as an authority. Usually involves a spoof website that tricks you into believing you are on a real web site for the business you think you are dealing with.
Vishing, Using VOIP (robocalls) to phish over the phone system.
SMishing, using test messaging to phish.
Hoax,is a deliberate attempt to dupe, deceive or trick an audience into believing, or accepting, that something is real
Scam, A fraudulent business scheme; a swindle. Often involves false business claims or advertising
Virus, computer program that can copy itself and infect a computer without the permission or knowledge of the owner
Identity theft fraud that involves someone pretending to be someone else in order to steal money or get other benefits.
Malware software such as a virus, worm, trojan horse, or spyware that is installed on a system with harmful or malicious intent.
Pharming, is a hacker's attack aiming to redirect a website's traffic to another, bogus website.
Trojan Horse, Trojan horse is a program that appears harmless but has a hidden agenda.
Spyware, is computer software that is installed surreptitiously on a personal computer to collect information about a user,
Puddle Attack A phishing attack targeting the clients of a small financial institution, typically with very limited geographical coverage
Spear Phishing, the attacker infers or manipulates the context of his intended victim, and then "personalizes" his attack.
vmyths.com
Hoaxbusters
urbanlegends.com
Trend Micro Hoax Library
Snopes rumors, hoaxes, etc
HoaxSlayer.com
www.truthorfiction.com
Write a phishing email for your teacher and send it to his gaggle account.